warning

Obsolete Software

        Heads up, here.  We all need to keep aware of obsolescence of computer programs we may have come to rely upon.  David Passell sends this article, and comments,  "Here's an article on companies abandoning old software or creating systems that won't run it.
        "This one kind of bashes Apple, but I am not sure which old programs I have that may need Rosetta. Here is one suggestion for anyone who expects to have compatibility problems with Lion. (As one article pointed our "Lion may be Apple's Vista.")
        1. Don't throw away that older Apple. If it has USB, Firewire, and Ethernet ports it can still be useful. Even more so if it can run old OS 9 programs.
        "For example: I have a very old blue-bubble iMac. I keep it because I have 'journaled' since 1993 or so and a lot of my files arepassword-protected Word Perfect. If I want to check something out in the past I can go to the time frame and open it up. Of course, if I unprotect the file, I can copy it to a USB drive and then open it with OpenOffice on the latest machine (assuming Lion runs OpenOffice). BUT I need the old program to open Password protected files."

Stay Alert, With Reasonable Precautions

Eagle-eyed PMUG users keep us informed!  Both Jim Hamm and Allen Laudenslager pass along some vital info.  In other words, stay alert, with reasonable precautions!"Here is an article commenting about potential malware for Macs," begins Jim Hamm.  The author makes some good points, and, as he notes, Macs are not immune to malware. As the Mac presence on the internet increases, we become more of an attractive target for malware. As Mr. Bott observes, every percentage point increase in Apple's share of Web traffic means about 10 million more potential customers for hackers. "This article isn't any cause for alarm, just something to be aware of. Anyone who uses a computer and surfs the net is potentially vulnerable to malware. We just need to be alert and exercise reasonable precautions," Jim summarizes the situation. More information is just in from Allen Laudenslager, "There has been a lot of news lately about Mac 'viruses' and malware, particularly something called Mac Defender*#% "First and most importantly, this is not a virus, it's a trojan horse. What it really does is fake you into downloading an app that reports a 'virus' and asks you to buy their software. The big con is to get your credit card information, not eat your data! I really liked this article for plain speak and clear explanations. I really liked Mac360's quote of Betteridge’s Law of Headlines: 'Any headline which ends in a question mark can be answered by the word no.' "A little common sense and a quick check of the internet will protect your Mac better than some 'anti-virus' software from an unknown source. "For the official Apple stand on viruses and malware, check here." And now it's Skype with problems.  Apparently Skype users should have known about this since April 14 when an update for software was made available and publicized.

How to Check It Out

        With scams and suspicious things in the news we can thank Art Gorski for passing along his experience.  He writes, "Just yesterday I got an email from PayPal asking me to agree to a new set of terms and conditions to continue to have a PayPal account.
        "If I didn't have a PayPal account this would obviously be spam I could just delete. However, I do have a PayPal account.
        "This could still be an attempt to lure me into trouble, so I carefully examined the email. The Reply-To address looked OK, it ended in 'paypal.com' and not in something dangerous like 'paypal.com.ru.' I used the 'View > Message' menu in Mail to show the message as 'Raw Source.' This makes it thoroughly ugly, but will reveal all the website links hidden in the message as they really are. All of these looked OK.
        "But still, I'm paranoid about 'social engineering' scams that try to get you to give up your username and password, and PayPal is a potentially very damaging one if you lose your credentials to a hacker.
        "So in the end, I trashed the email and just used my normal Safari bookmark to log in to PayPal. Sure enough, the website asked me immediately to agree to new terms and conditions, so I handled it from there, since I knew it was safe to do so."

Watch Out For This

        Just spotted this article from ComputerWorld about fake security software on Mac.  You'll want to be knowledgeable about this threat.  Apple discussions has more than 20 entries on this, with the most recent dated today, 5-2-11.
          Jim Hamm sends us this from The Unofficial Apple Weblog with  specifics for finding and deleting -- as well as preventing -- the MacDefender app.  The article tells us to uncheck "Open 'safe' files after downloading" in Safari Preferences.  And the writer closes with, "For those of you who haven't been hit by the MacDefender app, take care while downloading images for the next few weeks."

Adobe Critical Update

Adobe calls it a "critical update" and you'll want to read about it here.  Thanks to Jim Hamm for alerting us this afternoon.  Go to Adobe here to see what version you already have installed. Then go to this help page to specify settings you want for privacy, storage, security, notifications, playback settings, and peer-assisted networking panel.  Are you giving permission for companies to access your computer's microphone and camera?

Do Taxes Online? Consider This . . .

It's Tax Time and here's a sobering message from Jim Hamm first thing this morning.  He writes, "According to this article, Intuit was not affected by the recent hack into Epsilon's e-mail data file, but warns its customers to be careful anyway. We use Intuit's Turbo Tax online system to do our tax return each year. The possibility of a breach of a company's security system is one downside, and risk, of storing personal data online. But, with the popularity of online shopping, banking, etc., it's almost impossible not to do so."

Things About Trojans You Need to Know

Ever watchful, here's from Jim Hamm.  With the title, "I Smell a RAT" we know that there's something here to read!  What are trojans and how do you get them?  How do you protect your Mac?  Jim comments, "It's oft been said the best protection from the malware lies between the chair and the computer!"  While you're at it, you might want to sign up to get Small Dog Electronics' Tech Tails.

Warning About Email Swindles

        Alert for security breaches, the latest breaking news about Epsilon grabs our attention.  We heard from Jim Hamm who has been notified by Chase Bank.
        Jim sends us this article from ComputerWorld which lists 32 companies who are involved.  The writer advises, “Keep your security software updated. If you feel like you really must open an email from one of these companies, then mouse over the link to see if the domain name matches the company. Check for HTTPS. Don't give out sensitive personal information unless you are 100% sure you are dealing directly with the company as these emails can open the way to identity theft."
      

A Reminder to Be Careful

        A warning of a trojan comes from Jim Hamm.  The Mac blog he subscribes to sent this, ""Today the Black Hat Trojan infected a Mac OS X server at a company that I work with in Washington, D.C. The company has about 65 Macs at this location.  The Trojan came in via an unknown attachment to an email message and then infected 15 Macs that had been asleep during the night.  When employees arrived for were five were tricked by the Trojan into keying in their Admin password at which point the entire HD was wiped clean including OS and the Trojan itself."
          Jim adds, "Along the same vein are comments on a backdoor trojan from this website." And Jim concludes, "No great cause for alarm, just something to be aware of. From further reading on the blog, one should be careful if all of a sudden you're asked to enter your admin password -- especially when, at that point in time, it isn't normal for you to do so."

They Know Where You Are

     Here's info on a serious privacy issue.  Jim Hamm sends this link to an investigative news video that demonstrates how your camera and your smartphone can show everyone where the picture was taken.  Jim comments, "What's the problem with this, you ask? Well, say you've taken a picture of an expensive diamond ring to sell on eBay and you post it to the site and await the bidding. In the meantime, Joe the crook, gets the location of your house from the picture and steals the ring. Ouch!"  The GPS location on the photos you post can show everyone where you've been.  Watch the video, then share the info with your kids, too.

Bank Trojan Described

"Now here is a scary scenario on how internet thieves can get into your bank account, " writes Jim Hamm. "I'd not heard of 'ID tokens' previously, but apparently the thieves break into the bank's computer system and 'steal' or access these tokens. Take a read on the rest of the article on what happens next. Perhaps I'll send this article to Chase, our bank.  These internet/computer thieves are really getting sophisticated."  Jim concludes, "Makes one want to stop doing any banking online."

Warning. . . Just in Time

We have De Previous Prez Allen Laudenslager to thank for this timely warning about the latest updates.  "If you attend the monthly meetings regularly, you should remember Rich Charpentier who presented on how he uses his Mac in his work as a photographer and photo printer."Rich has been blogging for several days on problems he has had with updates to his Mac. If you aren't following Rich's blog, your really should give it a look since he regularly includes not only Mac tips, but some spectacular photos of the local area. "In his current post, Rich talks about his latest round of problems caused by the software update from Apple that updates his HP print drivers and because of the tweaks he needs to print his high quality, large format prints for his customer the updates hose his system. "If any of you have had any problems with your system after incorporating updates, change your process to accept only one update at a time and if you experience any trouble, put that on your 'don't accept this update list' to cut any future problems." Here's a link to Rich's latest post and his blog. Apple Discussions has some give and take on this issue.  (Personally, I think I'll postpone upgrading to the HP 2.5.2 printer software update for my printer-- E. )

Avoid Firesheep!

        Responding to the warning from De Previous Prez Allen Laudenslager posted a few days ago,  "Here is an article on avoiding Firesheep," begins David Passell.  He goes on, "I also noted some of the comments, particularly the last one. I haven't tried Firesheep and probably won't. John (not any moron) is probably capable of using it. Maybe he should see how difficult it really is to eavesdrop on a WiFi network and get into a computer connected to it."
        Then David comments, "Firesheep has made it possible for any moron to raid your Web use, but there are ways you can stop it. Here are a few of them."  See the "Five Ways to Shear Firesheep" article.

Beware of Firesheep

        "What the heck are Firesheep? Actually the question is what are, but what is Firesheep."  After so getting our attention De Previous Prez Allen Laudenslager instructs us,  "It's a new application that give even novice computer users the capability to capture your online session (yes, even transactions that include your banking password!) without being a hard core programmer.
        "So start thinking about enabling the password security to your in home WiFi network. While my WiFi router does use the older and less secure encryption, I do live in a location where you must actually drive 200 feet into my private drive to get a signal. Trust me, my dog will go nuts if you do that.
        "Once more, commercial applications are ahead of the power curve.  For the full article, click here."
         Now today (10-29) here's an informative piece on how Firesheep brings hacking to the masses.  Security issues grab our attention!